| 2015 | 0 reads | 0 | |
Fisher's Techniques of Crime Scene Investigation, First International Edition - William J. Tilstone
- Michael L. Hastrup
- Camilla Hald
- Barry J. Fisher
| 2012 | 0 reads | 0 | |
IS management handbook - Carol V. Brown
- Heikki Topi
| 1999 | 0 reads | 0 | |
Information Security Policies, Procedures, and Standards | 2001 | 0 reads | 0 | |
Cyber crime investigator's field guide - Bruce Middleton
- Béla G. Lipták
| 2001 | 0 reads | 0 | |
Oracle identity management | 2007 | 0 reads | 0 | |
Managing global development risk - James M. Hussey
- Steven E. Hall
| 2007 | 0 reads | 0 | |
Maximizing ROI on software development | 2004 | 0 reads | 0 | |
The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results - Michael D.S. Harris
- David Herron
- Stasia Iwanicki
| 2008 | 0 reads | 0 | |
Software engineering handbook | 2002 | 0 reads | 0 | |
| 2002 | 0 reads | 0 | |
Complete guide to security and privacy metrics | 2006 | 0 reads | 0 | |
Enterprise Business Architecture - Ralph Whittle
- Conrad B. Myrick
| 2004 | 0 reads | 0 | |
Mechanics of User Identification and Authentication: Fundamentals of Identity Management | 2007 | 0 reads | 0 | |